Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 08:52
Static task
static1
Behavioral task
behavioral1
Sample
4a4b15c570a6dde12b432e6e81e323d3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4a4b15c570a6dde12b432e6e81e323d3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4a4b15c570a6dde12b432e6e81e323d3_JaffaCakes118.html
-
Size
31KB
-
MD5
4a4b15c570a6dde12b432e6e81e323d3
-
SHA1
775489918f8de3d289acc33c542cb25e428991ae
-
SHA256
39c83d3864c6e85ae4ddbc1c606d21c22847ad199be438a40c84472c78e458e8
-
SHA512
0f52a6aab9b8f5db2859095ea9d2e049443a06c37be59dcda0a5a1d2812ac569d593ba8180a524e012046c5c58705d96c21260f0ea8c3f6f12e6fdb1531e16e4
-
SSDEEP
192:VWCk3GDG7GSFGNGeWqGUpGtqhyn2b5nQmnQjxn5Q/fnQieuNnRnQOkEntVtnQTba:ACk3GDG7GaGNG9qG8GtdQ/OWSbSQ/jAf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 5048 msedge.exe 5048 msedge.exe 2712 identity_helper.exe 2712 identity_helper.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5048 wrote to memory of 3496 5048 msedge.exe 83 PID 5048 wrote to memory of 3496 5048 msedge.exe 83 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 4260 5048 msedge.exe 84 PID 5048 wrote to memory of 3300 5048 msedge.exe 85 PID 5048 wrote to memory of 3300 5048 msedge.exe 85 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86 PID 5048 wrote to memory of 1480 5048 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4a4b15c570a6dde12b432e6e81e323d3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa82fd46f8,0x7ffa82fd4708,0x7ffa82fd47182⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,12071230989045003323,1250690453647839014,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,12071230989045003323,1250690453647839014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,12071230989045003323,1250690453647839014,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2512 /prefetch:82⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12071230989045003323,1250690453647839014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12071230989045003323,1250690453647839014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,12071230989045003323,1250690453647839014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,12071230989045003323,1250690453647839014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12071230989045003323,1250690453647839014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12071230989045003323,1250690453647839014,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12071230989045003323,1250690453647839014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2160 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12071230989045003323,1250690453647839014,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,12071230989045003323,1250690453647839014,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5400 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD538078a0214b3b161e0fbf60af3e9902c
SHA1d27ae2e92ddf6cbf056353bd2aad2ca6fe375f94
SHA2563711bc7f5851d009df6f8b9991062b5a5ec97f3a289535890831a1b708d372ec
SHA51268bb4cdcc2a353a1d0ae97bcaa409977e8bba5a63488062512b7cfbfe17b4706c6de6e2d8890b6e5213b237191d9476efdb2f2aa2b838faf28f4533a6fee1bca
-
Filesize
6KB
MD5c51868cc525167990926ee05c51a4751
SHA15d42927f73e3f45fb8454057c2c8889fecaf52c2
SHA2568716a578a9dcdbc4115b12f8e69c44ab0ed10de1b31576d1d75334d788ed2b9d
SHA512411543078f6408e32398be0c77e96c3cd877bc6e4720e20189f9199ac2c7f3c76343db626dc8c50d53d95b6a7dbde6429d1563f7f7f37c87db70e2025410efc0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD530f85aae1fbd4218a5fb1526db2adc2e
SHA1d8e6eb204774d044fbb9d296e428e740ccb83ee4
SHA256aa7f729ccda4c67b1c076bf4070efe31a272f1e5b34692d779e9d031c377dd58
SHA51271d784ab9fda006324c64f098c9a12986c30c2d389dd5d8f92bf0903b6094669d59f768da5c98b03fbc39cf16388dad403293d05abdf9a34a088827a6e4f7a2a